Watch out for scams surrounding news of stolen celebrity nude photos
Scammers look to capitalize on narrative of an iCloud breach and public interest in additional stolen photos and videos.Read more...
View ArticleFresh phish served with a helping of AES
Attempts to use encryption to make analysis of phishing websites more difficult may be a sign of things to come.Read more...
View ArticleApple IDs targeted by Kelihos botnet phishing campaign
Botnet targets Apple customers, launching phishing email campaign to lure victims into disclosing their Apple IDs and passwords.Read more...
View ArticleSignificant security challenge for new vehicle communication standard
While V2V communications will enable a range of safety applications, securing the protocol will require a system of unprecedented complexity.Read more...
View ArticleMicrosoft Patch Tuesday – September 2014
This month the vendor is releasing four bulletins covering a total of 42 vulnerabilities. Thirty-six of this month's issues are rated Critical. This month the vendor is releasing four bulletins...
View ArticleNew iPhone could herald change to payments security landscape
The arrival of Apple Pay could help improve point-of-sale security but attackers are also likely to severely test the security of the new technology.Read more...
View ArticleSnifula banking Trojan battles local Japanese security product
Snifula variant blocks image on bank’s website advising users to install PhishWall security software.Read more...
View ArticleLife on Mars: How attackers took advantage of hope for alien existance in new...
Attackers sent fake NASA emails containing “proof” of alien life on Mars to spread Backdoor.Darkmoon.Read more...
View ArticleHow to secure your new iPhone in three simple steps
Symantec recommends best practices to keep your Apple ID account and iPhone safe.Read more...
View ArticleShellShock: All you need to know about the Bash Bug vulnerability
Web servers at risk as new vulnerability potentially affects most versions of Linux and Unix, as well as Mac OS X.Read more...
View ArticleAustralians increasingly hit by global tide of cryptomalware
Australia hit with a 1,300 percent increase of cryptomalware in global surge of cybercriminal activity.Read more...
View ArticleHacked Snapchat accounts use native chat feature to spread diet pill spam
Compromised Snapchat accounts have sent out photo messages of a box of Garcinia Cambogia, followed by a chat message with a suspicious link containing ‘groupon.com’ in the URL.Read more...
View ArticleSandworm Windows zero-day vulnerability being actively exploited in targeted...
Critical new Windows zero-day has reportedly been used in a limited number of targeted cyberespionage attacks to deliver a back door on to the victim’s computer.Read more...
View ArticleSecurity vendors take action against Hidden Lynx malware
Cross-industry collaboration results in major blow against Hikit malware used by Hidden Lynx APT group.Read more...
View ArticleMicrosoft Windows TrueType Font parsing zero-day vulnerability used in...
A zero-day vulnerability affecting Microsoft Windows TrueType Font (TFF) parsing is reportedly being used to gain remote access into an international organization.Read more...
View ArticleMicrosoft Patch Tuesday – October 2014
This month the vendor is releasing eight bulletins covering a total of 24 vulnerabilities. Thirteen of this month's issues are rated ’Critical’. This month the vendor is releasing eight bulletins...
View ArticlePoodle: Vulnerability in old version of SSL represents new threat
New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure connections. New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure...
View ArticleDropbox users targeted by phishing scam hosted on Dropbox
Fake Dropbox login page attempts to steal credentials for popular email services. Fake Dropbox login page attempts to steal credentials for popular email services.Read more...
View ArticlePDF invoices may cost more than you expect
Misspelled invoice email claims to be looking for payment but steals confidential information instead. Misspelled invoice email claims to be looking for payment but steals confidential information...
View ArticleDenial-of-service attacks—short but strong
DDoS amplification attacks continue to increase as attackers experiment with new protocols. DDoS amplification attacks continue to increase as attackers experiment with new protocols.Read more...
View Article